Yesterday the GDV team at Ordnance Survey hosted an internal hack day where staff members across the business spent the day (online and in-person) thinking about new ways the OS National Geographic Database (NGD) can help our customers. The emphasis was on unlocking the analytical capability of NGD with an end focus on visual output. Lots of useful insight and ideas to digest and build on and it was great to see so much engagement and creativity.
Paul Naylor’s Post
More Relevant Posts
-
Tomorrow I'm delivering a closed door briefing on APT41 - thanks to the amazing research of Kristina Balaam and Justin Albrecht. During my own research in preparation of this briefing, I'm reminded of the importance of all-source collection and analysis. Lookout's massive data set on the mobile threat vector enables a better understanding of threat actors, TTP's, and insight into threat actor operations that's missing in today's reporting. There were several "ah-ha!" moments piecing together all the data and taking a step back to look through it all.
To view or add a comment, sign in
-
-
Gain an understanding of the integration of threat and intelligence supportability analysis and effective communication between intelligence, requirements and acquisition communities with the Foundational Acquisition Intelligence Credential. Learn more about this credential at https://lnkd.in/gFxb4584
To view or add a comment, sign in
-
-
Breaches are non-linear and highly detailed, and that makes it really difficult to describe them in prose. Attack Flow provides the tools and standards to visualize and communicate about incidents, campaigns, and actors with precision. ctid.io/attack-flow
Last week’s technical deep dive into the compromise of a MITRE research network included a detailed description of the attack. Today, we are sharing a visual representation of the attack scenario using Attack Flow. ⭐ Here is the attack flow: https://lnkd.in/gpc_-rJW ⭐ What is attack flow? https://lnkd.in/gteGHH8m ⭐ Where is the blog? https://lnkd.in/efi-eG8i
To view or add a comment, sign in
-
-
Last week’s technical deep dive into the compromise of a MITRE research network included a detailed description of the attack. Today, we are sharing a visual representation of the attack scenario using Attack Flow. ⭐ Here is the attack flow: https://lnkd.in/gpc_-rJW ⭐ What is attack flow? https://lnkd.in/gteGHH8m ⭐ Where is the blog? https://lnkd.in/efi-eG8i
To view or add a comment, sign in
-
-
CISM | CISSP | EC-CONCIL CCISO | EXIN DPO CISO ISMP | COMPTIA Security+ Cysa+ Pentest+ CNSP CNVP CSAP | 27001 Lead Implementer
Do you can explain any attack flow easily? Did you know that Attack Flow is a great Tool that can help you in these steps? Here is a use case example so that you can understand the right usage of it. The last publicly known compromise of the Mitre research network. One more time, congrats for the Center for Threat-Informed Defense work. #CyberSecurity #ThreatModeling #AttackFlow #MITREATTACK #AdversaryTactics #InfoSec #CyberDefense #ThreatIntelligence #SecurityOperations #CyberThreats
Last week’s technical deep dive into the compromise of a MITRE research network included a detailed description of the attack. Today, we are sharing a visual representation of the attack scenario using Attack Flow. ⭐ Here is the attack flow: https://lnkd.in/gpc_-rJW ⭐ What is attack flow? https://lnkd.in/gteGHH8m ⭐ Where is the blog? https://lnkd.in/efi-eG8i
To view or add a comment, sign in
-
-
Global Service Management Consultant (ITIL Expert)| Cyber Security Exposure Management Expert | Executive Coach | Keynote Speaker
It was great to attend this workshop. It opened my eyes the world of Threat Intelligence.
To view or add a comment, sign in
-
Leveraging changes to realize improvements…
Proven Executive Leader| Certified Cybersecurity Professional : CISSP | Advisory Board | Committee Chair | Entrepreneur | Innovator | Critical Thinking | Intellectual Curiosity | Author | Moderator | Speaker | Mentor
This is an interesting development to me… https://lnkd.in/eB4uS6KY
To view or add a comment, sign in
-
Today is the 𝗳𝗼𝘂𝗿𝘁𝗵 𝗶𝗻𝘀𝗶𝗴𝗵𝘁 in our week-long series demonstrating the power of our Player Model, which assesses over 145,000 players in a single, predictive rating system 👇
To view or add a comment, sign in
-
🚀 Experience the power of data-driven threat intelligence with #ThreatQuotient. Book a live demo and witness it in action. https://bit.ly/3LnR0By
ThreatQ Platform
To view or add a comment, sign in
Leading Business & Technology Innovation Strategy | Head of Innovation (AI & XR) | Microsoft MVP | MSc Entrepreneurship Management and Innovation
3wLove this. If you ever do an external hackathon, let me know.